inel

Results 1 - 25 of 35Sort Results By: Published Date | Title | Company Name
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
D’ici à 2021, le coût de la cybercriminalité pour l’économie mondiale devrait atteindre les 6 000 milliards de dollars, soit deux fois plus que les 3 000 milliards de dollars de 2016. En parallèle à ce que certains qualifient de « pire menace pour les entreprises du monde entier », les gens s'inquiètent de plus en plus de la sécurité de leurs données – non seulement des capacités des cybercriminels à utiliser des données volées pour usurper leur identité, mais aussi de l’utilisation de leurs données personnelles par les entreprises avec lesquelles ils interagissent.
Tags : 
rgpd, impact, sur, votre, gestion, donnees
    
AstuteIT_ABM_EMEA
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
Schätzungen zufolge wird die Cyber-Kriminalität die Weltwirtschaft bis 2021 6 Billionen USD kosten. Das entspricht einer Steigerung von 3 Billionen USD gegenüber 2016. Manche Analysten bezeichnen dies bereits als die „größte Bedrohung für alle Unternehmen weltweit“. Auch das öffentliche Bewusstsein für die Datensicherheit nimmt zu. Dabei geht es nicht allein darum, wie Kriminelle gestohlene Daten in betrügerischer Weise missbrauchen könnten, sondern auch darum, wie Unternehmen und Institutionen die personenbezogenen Daten nutzen, die wir ihnen zur Verfügung stellen.
Tags : 
    
AstuteIT_ABM_EMEA
Published By: SAS     Published Date: Jan 17, 2018
This RSR custom research report explores the impact of omnichannel methods on merchandising, marketing and the supply chain; specifically, what analytical capabilities address the challenges that omnichannel selling and fulfillment pose for retailers. Consumers today routinely begin their shopping journeys online, but complete their purchases in nearby stores, in their “home” stores or delivered directly to their doors. Retail analytics enables organizations to capture data from their customers' journeys. Retailers that successfully deliver relevant omnichannel experiences while gaining a more sophisticated understanding of demand (where and how it is initiated) will enhance their brands’ value and create compelling and profitable customer relationships.
Tags : 
    
SAS
Published By: Progress     Published Date: Oct 09, 2017
"The old rules no longer apply. Digital technologies have radically transformed the business landscape, yet many organizations have completely ignored this reality. A new survey of IT decision makers found 96% see digital transformation as important or critical, yet 55% say they have one year or less to respond before they financially suffer. By failing to prepare for new technologies, devices and systems, organizations have threatened their own survival. The Digital Ultimatum, is your first step towards building a future-proof organization that optimizes the customer experience and routinely achieves organizational excellence."
Tags : 
    
Progress
Published By: Microsoft Office 365     Published Date: Sep 26, 2017
Today’s workforce is more mobile than ever before, routinely working whenever and wherever necessary, using a variety of mobile devices and productivity apps. They expect their tools to deliver the capabilities they need to stay productive and efficient. But what if they don’t? When a business doesn’t support its workforce with suitable, properly vetted apps, employees will often download and install the tools they like. This trend, called “Shadow IT,” is almost always a recipe for trouble. One-off, standalone apps don’t conform to business strategy and growth plans, but instead create difficulties — security, compatibility, compliance and technical support — that draw resources away from strategic work.
Tags : 
    
Microsoft Office 365
Published By: Lookout     Published Date: Sep 25, 2017
Cloudoptimierte, gerätegestützte Abwehr mobiler Bedrohungen Bei der Lookout Security Cloud handelt es sich um eine cloudbasierte Plattform, die sowohl breit angelegte als auch hochentwickelte mobile Bedrohungen erkennt und stoppt. Sie schützt mobile Endgeräte und Infrastrukturen vor Bedrohungen aus dem Spektrum mobiler Risiken, ermöglicht eine detaillierte Untersuchung der Bedrohungen und unterstützt eine große Anzahl an Lookout-Produkten:Was macht die Lookout Security Cloud so besonders? Die Lookout-Plattform unterscheidet sich in vier wesentlichen Punkten von anderen Herstellern aus dem Bereich „Abwehr mobiler Bedrohungen“ (Mobile Threat Defense): 1. Einzigartig umfangreiches globales Gerätenetzwerk 2. Branchenführender Mobildatensatz & Maschinelle Intelligenz 3. Umfangreiche Sicherheitsfunktionen 4. Cloudoptimierter, gerätegestützter Sicherheitsansatz
Tags : 
    
Lookout
Published By: Juniper Networks     Published Date: Aug 07, 2017
Warum maschinelles Lernen entscheidend zur Cybersicherheit beiträgt
Tags : 
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
In a world where customers and citizens expect so much more from technology, the race is on to develop a finely tuned high performance IT function. Hopefully by reading this book you're in a better position to see how DevOps supports this imperative and can develop the strategies needed to reignite your business.
Tags : 
digital experience, mobile applications, business success, innovations, market, risk and cost, software development, ca technologies
    
CA Technologies EMEA
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Published By: Akamai Technologies     Published Date: May 24, 2017
Sicherheit und Performance wurden einst als separate Aspekte angesehen, für die ganz unterschiedliche Lösungen erforderlich sein sollten. Cyberkriminelle haben jedoch neue und überaus effektive Möglichkeiten gefunden, die Ihre Website in beiderlei Hinsicht gefährden. Erfolgreiche Lösungen müssen daher Sicherheitslöcher stopfen und parallel die Performance am Frontend optimieren. Wie ist das möglich? In diesem Bericht gehen wir auf browserbasierte Lösungen ein, welche gleichzeitig die Sicherheit optimieren und die Performance für den Endnutzer verbessern. Wir untersuchen verschiedene Techniken für den Umgang mit inhaltsbezogenen Browserproblemen, wie z. B. HSTS, Inlineframe und Prefetching. Der Bericht behandelt zudem Service-Worker- und browserbasierte Skripts, die viele Sicherheits- und Performanceoptionen bieten. Laden Sie den Bericht jetzt herunter und erfahren Sie, wie Sie Sicherheit und Performance gleichermaßen verbessern können.
Tags : 
    
Akamai Technologies
Published By: SAS     Published Date: Apr 20, 2017
Enterprises routinely claim to be focused on the customer experience, yet few really keep that promise. What’s in the way? Fragmentation and complexity in both customer data and customer-facing processes. IIA spoke with Wilson Raj, Global Director of Customer Intelligence, and Jonathan Moran, Customer Intelligence Product Marketing at SAS Institute Inc. about how organizations can leverage technology platforms and analytics to become more completely and genuinely customer-centric – making connections in the right way, at the right time, and on the right device.
Tags : 
    
SAS
Published By: Progress     Published Date: Mar 06, 2017
The Digital Ultimatum, is your first step towards building a future-proof organization that optimizes the customer experience and routinely achieves organizational excellence.
Tags : 
    
Progress
Published By: Hewlett Packard Enterprise     Published Date: Jul 13, 2016
Download this asset to learn CRM and BI solutions can help you deliver insights to meet those expectations. They’re not just for the enterprise anymore – but to make the most of them, you’ll need plenty of compute power and scalable data storage. Sponsored by: HPE and Intel®
Tags : 
best practices, inel, hpe, bi solutions, enterprise, data storage, backup, recovery
    
Hewlett Packard Enterprise
Published By: IBM     Published Date: Feb 17, 2016
In our benchmark research, at least half of participants that use spreadsheets to support a business process routinely say that these tools make it difficult for them to do their job. Yet spreadsheets continue to dominate in a range of business functions and processes. At the heart of the problem is a disconnect between what spreadsheets were originally designed to do, and how they are actually used today in corporations.
Tags : 
ibm, spreadsheets, ventana research, switch, spreadsheets, software development, it management
    
IBM
Published By: Salesforce     Published Date: Jan 14, 2016
App Cloud gives Crossmark the speed and precision necessary to support Crossmark’s team of field agents who routinely collect data in stores via mobile devices.
Tags : 
salesforce, crossmark, success, app cloud, customers, enterprise applications, human resource technology
    
Salesforce
Published By: Salesforce     Published Date: Dec 29, 2015
App Cloud gives Crossmark the speed and precision necessary to support Crossmark’s team of field agents who routinely collect data in stores via mobile devices.
Tags : 
salesforce, crossmark, success, app cloud, customers, enterprise applications, data management, human resource technology
    
Salesforce
Published By: Cherwell Software     Published Date: Sep 22, 2015
The next generation user expects more do-it-yourself IT offerings. Whether it’s self-service portals with interfaces to rival Amazon or personal mobile devices with 24/7 business access, users are requesting more self-service functions and capability. To the modern user of technology “consumer-grade” has become a standard, and it’s ITs’ job to not only appease but genuinely satisfy contemporary users. This research highlights four ways to satisfy the modern user who brings their own knowledge, devices, applications and technical expectations to the workplace.
Tags : 
business enablement, cloud applications, cloud computing, cloud infrastructure, cloud strategy
    
Cherwell Software
Published By: Cisco     Published Date: Aug 03, 2015
County Integrates Wired and Wireless Networks.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 10, 2015
Let these case studies show how you can succeed with mobility, too. Pinellas County Integrates Wired and Wireless Networks Cisco Meraki Architecture Construction - C&S Companies Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution Cisco CMX Connects Evergreen Brickworks Video
Tags : 
cisco, case study, byod, wireless, wifi, network integration, cmx
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
Be inspired by these mobility success stories by downloading these case studies: • Pinellas County Integrates Wired and Wireless Networks • Cisco Meraki Architecture Construction - C&S Companies • Hospital Pioneers Wi-Fi Patient Apps with Cisco BYOD Solution • Cisco CMX Connects Evergreen Brickworks Video
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: DocuSign     Published Date: May 29, 2014
Few business processes are as security sensitive as those involving electronic signatures. eSignature transactions routinely contain information that is critical to you, your business, and your customers. This information may include personally identifiable Information (PII), pricing details, proprietary business terms, intellectual property, and more. That is why DocuSign’s number one priority is customer security. DocuSign leads the industry in designing and delivering the most secure digital transaction solution available.
Tags : 
docusign, security, esignatures, personally identifiable information, pii, customer security, digital transactions, enterprise applications
    
DocuSign
Published By: Oracle     Published Date: Mar 18, 2014
Customer relationship management (CRM) deployments are most effective when they legitimately support all three words that make up the acronym itself. Customers of the modern business-to-business (B2B) enterprise benefit when they purchase goods and services from companies who are focused on the buyer’s experience. Internal relationships within the selling organization are more effectively maintained when all customer-facing stakeholders have access to the rich data contained in a well-maintained CRM. And the management of the enterprise providing solutions can run their business like a finely-tuned machine when the maximum levels of visibility into customers and accounts are clear and accurate. This Research Brief combines research from a number of Aberdeen Sales Effectiveness research data sets, to create a holistic view of the most effectively deployed CRM systems.
Tags : 
oracle, customer relationship management, crm, b2b, internal relationships, sales effectiveness, sales teams, sales strategy
    
Oracle
Published By: Sophos     Published Date: Jul 01, 2013
Gone is the day of the corporate-issued BlackBerry device. With its finely ingrained policies, BlackBerry was once the go-to mobile device for security-savvy enterprises. Research from IDC shows that iPhone and Android now hold over 80% of market share, with Windows Phone 8 and BlackBerry completing for the third spot. The rising trend of mobility consumerization has reached a point where it is increasingly difficult for IT organizations to settle on a standard mobile device. This whitepaper will help you identify each device platform’s security features—and choose the right platform for your business.
Tags : 
mobile device, security
    
Sophos
Published By: IBM     Published Date: Dec 21, 2012
Interact with trusted BI content and enjoy the same user experience whether you are online at the office, using a smart phone or tablet computers on the road or offline.
Tags : 
ibm, cognos, mobile, inelligence, business intelligence
    
IBM
Published By: UL EduNeering     Published Date: Jul 05, 2012
Third party intermediaries have played starring roles in some of the most highly publicized global corruption trials. By any measure, third party intermediaries routinely rank high on the list of compliance worries for brand companies.
Tags : 
fda, gmp, gcp, gxp, cms, osha, qsr, 21 cfr part 11
    
UL EduNeering
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

Free Magazines

Hundreds of free magazines!